|Publication number||US8055757 B2|
|Application number||US 11/306,602|
|Publication date||Nov 8, 2011|
|Filing date||Jan 4, 2006|
|Priority date||Jan 4, 2006|
|Also published as||US20080228849|
|Publication number||11306602, 306602, US 8055757 B2, US 8055757B2, US-B2-8055757, US8055757 B2, US8055757B2|
|Inventors||Alan Wayne Watkins|
|Original Assignee||International Business Machines Corporation|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (18), Referenced by (5), Classifications (6), Legal Events (4)|
|External Links: USPTO, USPTO Assignment, Espacenet|
The present invention generally relates to apparatus and methods for a message buffering system, and more particularly, to advantageous systems, methods, and computer readable medium for organizing and outputting buffered messages to a logging subsystem.
Many of today's software applications which are being run on a computer system include a logging feature such as the Syslog utility provided by the GNU C library. This utility is utilized in conjunction with many operating systems, such as IBM's Z/OS, Unix, AIX and the like. Like most logging facilities, the Syslog utility is a heterogeneous network logging feature which provides one or more systems with the ability to store and process debug, trace, and error messages into a single data repository. A Syslog repository allows a system administrator or software developer to isolate problems with the system. Many applications which utilize a logging feature such as the Syslog facility simply write messages to the logging feature at the time a debug or trace point or error occurs in the system. In other words, log messages are written to a log in the order they are produced, sequentially one after another. For example, a software application may produce five log messages during its initialization and three log messages during the process of shutting itself down. If the application is started and then immediately stopped, eight log messages are written to the log in time order.
Internally, many of today's software applications are multilayered, meaning that the successful completion of a function performed at a particular layer of the application is dependent on the successful completion of a lower or higher layer. By way of example, consider an Internet Key Exchange (IKE) daemon supplying encryption keys to an internet protocol security communication (IP/SEC) stack. An IKE daemon is a software application which implements Requests for Comments (RFCs) 2407, 2408, and 2409. In particular, the IKE daemon provides two levels of keys for establishing a secure network communication path and securing the data exchange over the secure network communication path between two endpoints. The purpose of the first level or phase one is to create valid encryption keys for a limited time for the IP/SEC stack to establish the secure network communication path. Once the secure network communication path is established, the second level or phase two creates valid encryption keys to be used by the IP/SEC stack to encrypt the data between the two endpoints.
In the case of an IKE daemon, an endpoint, by way of a software application, will request a secure connection to send its data securely to another endpoint. In this example, phase two will be requested by the endpoint to secure the endpoints' data for transmission to the other endpoint. However, phase two must request a secure connection to be established from phase one. Consequently, phase one begins establishing a secure connection with the other endpoints. Once this connection is established, phase two begins generating keys to encode the endpoints data. The initial reporting of debug or trace messages and error messages or collectively referred to herein as log messages are typically from within the phase one and phase two portions of the software application. In the example above, the order of log messages to a Syslog repository could include phase two initialization messages, followed by phase one initialization, establishment, and completion messages, followed by phase two establishment and completion messages. As a result, the sequential outputting of messages in the software application makes the arrangement of messages in the Syslog facility difficult for a software developer to trouble shoot problems in phase two due to the interspersing of phase one messages. Furthermore, since the data of outputted log messages within a phase or between phases is typically not associated, each outputted log message typically becomes too large in order to provide enough useful information. Consequently, the Syslog file becomes cluttered and unorganized for the software developer to readily isolate the reported problem. Additionally, by sequentially outputting log messages when they occur, information which would be useful to be outputted with a particular log message during trouble isolation may not be available until after the particular message was logged. For example, the code section which contains a call to Syslog subsystem may not have access to the additional information or perhaps the information is not known until after the call to Syslog subsystem is invoked.
One prior approach to extracting useful information from the outputted log messages is to develop a software application to interpret the outputted log messages. However, this approach does not reduce the redundant information outputted in the log file which is typically significant. Such large outputted log files may cause network problems when being transmitting from a customer's site where a problem arises and the service engineer's site where trouble isolation is typically done.
The present invention recognizes the need to address problems resulting from sequentially outputting log messages and provides a computer implemented method, a computer readable medium, and a system to this end. Among its several aspects, the present invention defines a message block subsystem to buffer logical groupings of log messages in order to improve trouble isolation and validation of proper operation of application software. The computer implemented method also includes associating received log messages with items of work and organizing the received log messages according to the items of work. Each item of work contains one or more log messages. The computer implemented method may also suitably include outputting organized log messages according to items of work to a logging subsystem.
One aspect of the present invention advantageously organizes log messages according to an item of work to preclude log messages from different items of work to be interspersed in a logging subsystem. Another aspect of the present invention advantageously retrieves header information relevant to log messages associated with a particular item of work in order to acquire relevant information after a log message has been reported to the message block subsystem and to provide condensed output to aid in trouble isolation.
A more complete understanding of the present invention, as well as further features and advantages of the invention, will be apparent from the following Detailed Description and the accompanying drawings.
The present invention will now be described more fully with reference to the accompanying drawings, in which several presently preferred embodiments of the invention are shown. This invention may, however, be embodied in various forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art.
As will be appreciated by one of skill in the art, the present invention may be embodied as apparatus, methods, or computer program code or some combination thereof. Accordingly, the present invention may take the form of an embodiment combining hardware and software aspects. Furthermore, the present invention may take the form of a computer program code on a computer-usable storage medium having computer-usable program code embodied in the medium. Any suitable computer readable medium may be utilized including hard disks, CD-ROMs, optical storage devices, flash memories, magnetic storage devices, and the like.
Computer program code or “code” for carrying out operations according to the teachings of the present invention may be written in various programming languages such as assembly, C, C++, Java, or other languages. Software embodiments of the present invention do not depend on implementation with a particular programming language. The program code may execute entirely on a user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer. In the latter scenario, the remote computer may be connected to the user's computer through a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer, for example, through the Internet using an Internet Service Provider.
In the first exemplary configuration, when software application 115 executes on node 110, the log messages generated by software application 115 are temporarily stored or buffered in message block subsystem 111 on node 110 in accordance with the present invention. In the second exemplary configuration, when the software application 115 executes on node 116, log messages are stored in message block subsystem 111 on server 116.
It should be noted that although the nodes 110 and 112 are depicted as general purpose computers, the present invention applies to any computer system including a laptop, server, a workstation, a desktop, or the like which runs message block subsystem 111 in accordance with the present invention. It should also be noted that although a network 114 is depicted in
In operation, when application 115 recognizes a new item of work is about to begin, application 115 calls the start_new_work( ) function 313 at time 311 on the message block subsystem 111. For example, if application 115 is an IKE daemon, a new item of work may be defined when a phase two session has been requested. The call to start_new_work( ) 313 function by application 115 signals the message block subsystem 111 that a new item of work has begun. The message block subsystem 111 allocates a message block item and optionally returns an address to the message block item. The message block item can be viewed as a container for log messages corresponding to the same item of work and is described in further detail below in connection with
At time 312, application 115 may call add_msg( ) function 314 on the message block subsystem 111 to buffer a message with the message block subsystem 111. For example, if application 115 is an IKE daemon, an initialization log message for phase two may be buffered with the call to add_msg( ) during phase two. The message to be buffered and eventually logged would typically contain text or a reference number indicating text, a severity level such as informational, warning, error, and the like, and a flag. The flag may be used to indicate that a log message has been previously sent or is redundant. Thus, the flag may be used at log time to determine whether to log the message with the logging subsystem 220. For example, the flag of a present log message may indicate whether a more specific log message has already been buffered, thus, removing the need to output the present log message. In another example, the flag may indicate that subsequent redundant messages need not be outputted to the logging subsystem 220.
At time 321, application 115 recognizes a second item of work before the first item of work is completed. For example, in the IKE daemon example, a phase one session needs to be established before a phase two session is properly established. During phase two establishment, the IKE daemon may discover that a phase one session has not yet been established. Consequently, application 115 makes a call to start_new_work( ) function 316 on the message block subsystem 111 to indicate that a new work item is beginning, such as phase one session establishment. The message block subsystem 111 allocates a second message block item and optionally returns an address to the second message block item for the second item of work. Within the message block subsystem 111, the message block items are preferably buffered in a stack structure such that the latest message block item created is pushed on top of the stack.
At time 322, application 115 makes a call to the add_msg( ) function 318 to buffer a message corresponding to the second item of work. The call to add_msg( ) function 318 is similar to the call at time 312. However, at time 322, an extra information pointer (extra_info_ptr) is passed to the message block subsystem 111. The extra information pointer advantageously provides a mechanism for the message block subsystem 111 to retrieve application information which is relevant to the log message and to the second item of work in general. For example, if the application 115 is an IKE daemon and the second item of work is a phase one session, the extra_info_ptr pointer may reference the phase one session's programming environment which may include an associated calling stack, local and remote IKE identification information, local and remote IKE internet protocol (IP) port information and any pending phase two information. This retrieved information is typically used to construct a message block header which is then outputted with one or more corresponding messages to the logging subsystem. It should be noted that other programming techniques other than address or object passing between application 115 and message block subsystem 111 are contemplated and that the present invention should not be limited to the presently described function names and parameters passed between functions.
At time 323, application 115 recognizes that the address pointed to by the extra information pointer may shortly become invalid. In response to this recognition, application 115 makes a call to collect_info( ) function 327 on the message block subsystem 111. The collect_info( ) function 327 is a trigger for the message block subsystem 111 to collect the information associated with the work item and referenced by, for example, the extra_info_ptr pointer. The collect_info( ) function 327 may be alternatively embodied to collect the information from the extra information pointer associated with the message block item on the top of the stack. The collect_info( ) function 327 is typically called when the object or memory pointed to by the extra information pointer is about to be destroyed or become inaccessible. Otherwise, the collection of extra information from application 115 is performed when application 115 calls the syslog_current( ) function 332 which will be described below.
At time 324, a call to add_msg( ) function 330 is made to buffer a second message associated with the second work item. At time 325, a call to add_msg( ) function 331 is made to buffer a third message associated with the second work item. At time 326, application 115 recognizes that the second work item has completed and, thus, calls the syslog_current( ) function 332 on the message block subsystem 111. The syslog_current( ) function 332 collects additional information from application 115, if any exists, creates a header for the log messages associated with the message block item found at the top of a stack of message block items, and internally calls the pop( ) function 329. The pop( ) function 329 appends the header to the log messages associated with the message block item and forwards the appended log messages to the logging subsystem 220. Since the second work item is complete and the first work item was dependent on the successful completion of the second work item, it should be noted that at time 328 the log messages corresponding to the second work item have been outputted to the logging subsystem 220 as a group. The logging subsystem 220 is typically a sequential logger and thus outputs the messages sequentially to a system console or data file. If the application 115 is an IKE daemon, for example, the phase one log messages are outputted as a group before the phase two log messages, thus, organizing the log messages in a functional manner. This organization allows a software developer or network service personnel to easily navigate the data file.
Returning to the remaining calling sequence of the first unit of work 310B, the application 115, at times 333, 334, and 335 makes three calls to the add_msg( ) functions 336, 337, and 338, respectively, to buffer three additional messages with the message block subsystem 111 during the remaining calling sequence of the first unit of work 310B. At time 315, application 115 recognizes that the first unit of work successfully completed and, thus, calls the syslog_current( ) function 339 to process and output all the log messages corresponding to the first unit of work. The syslog_current( ) function 339 collects additional information from application 115, if any exists, creates a header for the log messages associated with the message block item found at the top of a stack of message block items, which in this case are associated the first item of work, and internally calls the pop( ) function 340 at time 317.
As shown in
As shown in
As shown in
As shown in
The syslog_all( ) function is a convenient function to allow all the messages associated with all the message block items to be outputted to the logging subsystem. Internally, the syslog_all( ) function would call the pop_all( ) function. The pop_all( ) function calls the pop( ) function for each message block item in message block subsystem. The processing of a specific log message will be discussed further in connection with
The extra_info_ptr pointer typically contains an address in the application's data space which stores the extra information. The info_type field indicates what type of information is being referred to by the extra_info_ptr pointer. Consequently, when the message items of a message block item are about to be outputted to the logging subsystem or when the information being referenced by the extra_info_ptr pointer is about to be destroyed, the extra information may be retrieved from the application, formatted and stored in the header data type. One technique to accomplish the header formatting is to require the application to provide a call back function which would be implemented by the application that receives the extra_info_ptr pointer and info_type field and an address of the header data type as parameters. In this technique, the application which is familiar with the data can be modified to provide a utility to be called by the message block subsystem 111 to format the data into a header.
Additionally, the data portion 520 includes a list of message items 525A-525C. As depicted in
The function portion 510 includes add_msg( ) and collect_info( ) functions 512 and 514, respectively. The add_msg( ) function 512 is called by the message block subsystem's add_msg( ) function described above in connection with the discussion of
The collect_info( ) function 514 is typically called from the message block subsystem's collect_info( ) and pop( ) functions. The message block item's collect_info( ) function 514 collects information from the calling application to populate the extra information data field of the message block item 500, if needed. This feature allows information to be gathered over the course of the running application after a log message has been buffered in the message block subsystem 111 and before the log message has been logged to the logging subsystem 220. For example, when the application is an IKE daemon, information such as IKE endpoints is gathered at the beginning of the negotiation, however, the endpoint identities are not initially known and do not become known until later in the negotiation process. As described below, this later generated extra information can then be retrieved at the time the message block item is about to be outputted to the logging subsystem 220. The extra information can be formatted as a header and precede all the log messages associated with the message block item when being outputted to the logging system. This behavior typically occurs when the collect_info( ) function 514 is called by the pop( ) function. An exemplary output showing header information will be discussed further in connection with
When the collect_info( ) function 514 is called by the pop( ) function, the pop( ) function will format the collected information to build a header to be outputted with each message item. The pop( ) function loops through the list of message items and may use message items' flags, such as flag 528, and other information to determine whether a message should be written to a logging subsystem. The pop( ) function allows for a user of an application to specify a filter to filter out specific log messages from being outputted to the logging subsystem. For example, the user may only be interested in trace messages so that only trace messages are outputted to the logging subsystem. By way of another example, the user may only be concerned with trace messages and critical errors. In this case, a filter may be set by the user and the pop( ) function would output log messages which were either trace messages or critical errors.
The priority data item 530 of the message block item 500 is determined by the most severe of all the messages in the message list. For example, if message item 525A had a level which was set to informational, message item 525B had a level which was set to warning, and message item 525C had a level which was set to critical, the priority data item 530 would contain the setting of critical. In this way, when the header information is logged with the logging subsystem, the filters of the logging subsystem will not restrict the header information from being outputted. For example, if a user selects a filter in the logging subsystem to only output critical messages, the header and critical message stored in message item 525C will be outputted by the logging subsystem.
The exemplary output 600 includes a header portion 610, a phase two log message portion 620, and a set of redundant log messages portion 630. It should be noted that the time stamps in the exemplary output 600 represent the time the corresponding message was outputted to the logging system 220 and not the time the log messages were buffered to the message block subsystem. The header portion 610 contains information relevant to the failed phase two negotiation item of work, in general, and contains information such as the local IP security address, remote IP security address, IP filter rule name, and the like. All of the messages in the exemplary log contain a message instance number, for example the number 3. This number is used to associate all the messages in this item of work. It should be noted that as a result of the buffering of the message block subsystem, there are no interspersed messages associated with another item of work outputted.
Also, note that the log messages in portion 620, while informative and to the point, do not carry some vital information that identifies which security association (SA) was experiencing a problem. Log message 625 shows the SA to equal an address which indicates that the contents of the address had not been valid at the time log message 625 was buffered to the message block subsystem. However, also note SA 615 which is located in the header portion 610. SA 615 has been reconciled to contain a value of 2. The header information was collected before outputting the messages to the logging subsystem and after the log messages in portion 630 were buffered to the message block subsystem. This exemplary log output exemplifies that information gathered after the log messages are buffered to the message block subsystem is garnered and displayed in the header information to supply additional relevant information in a condensed manner.
For illustrative purposes, the redundant message portion 630 is shown here to demonstrate which log messages are normally filtered. They are displayed in exemplary output 600 because a filter option which allows display of redundant messages was selected. Referring to
A method of buffering log messages according to a unit of work in accordance with the present invention is disclosed. At a first step, an item of work is defined. As described above, an application such as application 115 typically defines an item of work by calling the start_new_work( ) function on the message block subsystem 111. However, the present invention contemplates implicitly defining an item of work itself within the implementation of the start_new_work( ) function. At a second step, a log message is received from an application such as application 115. As described above, this step may be implemented by a call to the add_msg( ) function in the message block subsystem. At a third step, it is determined whether the received message is associated with the defined item of work defined in the first step. In other words, the method determines whether a message block item exists to which a log message may be associated. If so, the method proceeds to a fourth step. At the fourth step, the received log message is organized according to the associated item of work.
If the received log message was not associated with an item of work, then the method proceeds to a contingent step. At the contingent step, another work item is defined and the method then proceeds to the fourth step. The third and contingent steps may alternatively be implemented in the application.
At a fifth step, the organized log message is buffered. At a sixth step, the method determines whether it is time to report the organized log messages for an item of work. This determination may be made in various manners. For example, perhaps only the log messages associated with the latest item of work or message block item needs to be outputted. If so, the application may call the syslog_current( ) function. Additionally, if all the log messages associated with all the work items or message block items need to be outputted, the application may call the syslog_all( ) function. Other function calls to support subfunctions of the mentioned functions are also contemplated. For example, one function may output all messages for a specific item of work and another function may output the last message added for a specific item of work. At the sixth step, a common header containing information associated with the work item is optionally prepared. At a seventh step, the optional common header and the organized, buffered log messages for the item of work are outputted to a logging subsystem, such as logging subsystem 220.
While the present invention is disclosed in the context of specific exemplary software functions, many variations to these software functions are contemplated. For example, the parameters passed between the application 115 and the message block subsystem 111 may vary to allow a unique work item identifier so that multiple applications can utilize the same message block subsystem. Furthermore, the specific software functions may be combined and varied according to a programmer's desires to meet the context of the particular application and environment.
While the present invention has been disclosed in the context of various aspects of presently preferred embodiments, it will be recognized that the invention may be suitably applied to other environments consistent with the claims which follow.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US5729540||Jan 8, 1997||Mar 17, 1998||Qualcomm Incorporated||System and method for scheduling messages on a common channel|
|US6070189||Aug 26, 1997||May 30, 2000||International Business Machines Corporation||Signaling communication events in a computer network|
|US6366915 *||Nov 4, 1998||Apr 2, 2002||Micron Technology, Inc.||Method and system for efficiently retrieving information from multiple databases|
|US6421677 *||Jul 19, 1999||Jul 16, 2002||International Business Machines Corporation||Extension of data definition language (DDL) capabilities for relational databases for applications issuing DDL statements|
|US6470388||Jun 10, 1999||Oct 22, 2002||Cisco Technology, Inc.||Coordinated extendable system for logging information from distributed applications|
|US6574792||May 31, 2000||Jun 3, 2003||International Business Machines Corporation||Dynamically generating expanded user messages in a computer system|
|US20010003172 *||Dec 19, 2000||Jun 7, 2001||Skinner Gary R.||Time and activity tracker with hardware abstraction layer|
|US20020078058 *||Feb 28, 2001||Jun 20, 2002||Bird Paul M.||Method and apparatus for synchronizing not-logged application temporary tables in a multi-node relational database management system|
|US20020152268||Mar 19, 2002||Oct 17, 2002||Microsoft Corporation||System and method for communications management and data exchange|
|US20020165856 *||Mar 12, 2002||Nov 7, 2002||Gilfillan Lynne E.||Collaborative research systems|
|US20030055960||Aug 13, 2002||Mar 20, 2003||Alcatel||Method, service agent and network management system for operating a telecommunications network|
|US20050021836||May 1, 2003||Jan 27, 2005||Reed Carl J.||System and method for message processing and routing|
|US20060087409 *||Oct 25, 2004||Apr 27, 2006||Korzeniowski Richard W||System and method for analyzing user-generated event information and message information from network devices|
|US20060095472 *||Jun 7, 2005||May 4, 2006||Jason Krikorian||Fast-start streaming and buffering of streaming content for personal media player|
|US20060271826 *||May 25, 2005||Nov 30, 2006||Neeshant Desai||Syslog message handling|
|US20070118866 *||Nov 18, 2005||May 24, 2007||Sbc Knowledge Ventures, L.P.||System and method of communicating video content|
|JPH04118737A||Title not available|
|JPH05108312A||Title not available|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US8868661 *||Oct 8, 2008||Oct 21, 2014||Verizon Patent And Licensing Inc.||Message management based on metadata|
|US8909927 *||Nov 10, 2008||Dec 9, 2014||Continental Automotive Gmbh||Method for processing messages and message processing device|
|US20090133121 *||Nov 10, 2008||May 21, 2009||Continental Automotive Gmbh||Method for processing messages and message processing device|
|US20100088378 *||Apr 8, 2010||Verizon Corporate Services Group Inc.||Message management based on metadata|
|US20130254376 *||Mar 22, 2012||Sep 26, 2013||International Business Machines Corporation||Dynamic control over tracing of messages received by a message broker|
|U.S. Classification||709/224, 718/102, 719/318|
|Jan 4, 2006||AS||Assignment|
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:WATKINS, ALAN WAYNE;REEL/FRAME:016966/0702
Effective date: 20051229
|Jun 19, 2015||REMI||Maintenance fee reminder mailed|
|Nov 8, 2015||LAPS||Lapse for failure to pay maintenance fees|
|Dec 29, 2015||FP||Expired due to failure to pay maintenance fee|
Effective date: 20151108